Sciweavers

15073 search results - page 2741 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
ESORICS
2004
Springer
15 years 9 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen
EURONGI
2004
Springer
15 years 9 months ago
Admission Region of Multimedia Services for EDCA in IEEE 802.11e Access Networks
This paper presents a simulation analysis for the evaluation of the admission region of a IEEE 802.11e network adopting the EDCA (Enhanced Distributed Channel Access) mechanism. In...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
124
Voted
EUROPAR
2004
Springer
15 years 9 months ago
A Data Management and Communication Layer for Adaptive, Hexahedral FEM
The parallel realization of adaptive finite element methods (FEM) has to deal with several irregular and dynamic algorithmic properties caused by adaptive mesh refinement (AMR). ...
Judith Hippold, Gudula Rünger
GCC
2004
Springer
15 years 9 months ago
Hybrid Performance-Oriented Scheduling of Moldable Jobs with QoS Demands in Multiclusters and Grids
This paper addresses the dynamic scheduling of moldable jobs with QoS demands (soft-deadlines) in multiclusters. A moldable job can be run on a variable number of resources. Three ...
Ligang He, Stephen A. Jarvis, Daniel P. Spooner, X...
ICCS
2004
Springer
15 years 9 months ago
Using Runtime Measurements and Historical Traces for Acquiring Knowledge in Parallel Applications
Abstract. A new approach for acquiring knowledge of parallel applications regarding resource usage and for searching similarity on workload traces is presented. The main goal is to...
Luciano José Senger, Marcos José San...
« Prev « First page 2741 / 3015 Last » Next »